logo

Database

Description

The application has source code with high McCabe cyclomatic complexity, making the code difficult to understand and maintain, promoting the appearance of new security vulnerabilities and hindering their detection and solution.

Impact

Promote the creation of security vulnerabilities

Recommendation

Refactor the complex code by simplifying methods, subroutines or conditionals

Threat

Authenticated attacker from the Internet with write access to the code.

Expected Remediation Time

⏱️ 30 minutes.